Sciweavers

6861 search results - page 70 / 1373
» Security for Ubiquitous Computing
Sort
View
84
Voted
HOST
2008
IEEE
15 years 7 months ago
Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded Systems
Johann Großschädl, Tobias Vejda, Dan Pa...
ACISP
2008
Springer
15 years 7 months ago
A Tree-Based Approach for Computing Double-Base Chains
Christophe Doche, Laurent Habsieger
87
Voted
CCS
2007
ACM
15 years 7 months ago
Trusted computing challenges
Leendert van Doorn
102
Voted
CSFW
1997
IEEE
15 years 5 months ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter